Monday, April 2, 2012

tera power leveling is not secure.Operators used the "Web page" authentication method - TVU

129773162590468750_19Carrier Wifi high security information has been encrypted Coffee, free WiFi "phishing" storm event is still spreading. Recently tera power leveling, the technology expert tera power leveling, who asked not to be named said in the media, in addition to private building small WiFi diablo 3 gold, WiFi operators cannot guarantee hundred percent security. For the question, carrier technology in Shanghai has noted that the operators already address these security issues at the technical level, the userYou can rest assured that using WiFi. Variety of means to protect the network security experts who spoke on condition of anonymity said the communications operators of WLAN hotspots and WLAN hotspot and there is not much difference between Cafe, "when everybody is connected together, will be able to listen. "The Shanghai Telecom technologies employees refuted:" operator security mechanism used is much higher thanSome WiFi. "Mr Hui, currently is divided into two main public WiFi, was built by merchants from WiFi, with nothing to go with encryption, that is, all via the same password to enter the network, some even without password, easy opportunities left to hacking. This is like the keys to everyone, you enter the same door, is not secure.Operators used the "Web page" authentication method, "a case study of Shanghai Telecom, our Web page supports HTTPS encryption protocol, each corresponds to a unique user name and password, the user fill in the information in this Web page, are sent to the Terminal to the decryption, authentication. "In addition, all users ' IP addresses are assigned by the core router. In operatorWLAN network, hackers cannot intercept the user's IP address eavesdropping broadcast packets. "Even if the hacker knows my IP address themselves to set an IP can not access. Each user corresponds to the IP and the remote terminal is one by one, only a core router assign the address to access the network. At the same time, core router will monitor whether the userOnline, if the user is not on the line, will recover network resources in a timely manner, and close the channel to protect user security. "It has been revealed that last year, Shanghai Telecom Company WiFi networks started to mass adoption of thin AP (wireless access point, also known as a wireless bridge or wireless gateway). Thin core AP and lateral AC data transfer between devices, has been "cracked" encryption. "Like fireVegetables, lean mix for a mission with all data decomposition of AP, to AC terminals to be decrypted. Even if a hacker intercepts the data during, was also very confused do not understand. "Shanghai mobile to launch mobile phone authentication method, also have a higher security. Introduction of Shanghai Mobile Insider, mobile operators official WiFi signal, after successful user links,Open the browser to verify that the interface, require SMS verification through their mobile phone number, wireless can start surfing. Specifically to provide China Mobile with WiFi equipment professional services for construction and maintenance work of Yu said, operators of public WiFi network free of charge regardless of whether, and are based on telecom network equipment, performance and stability. Operators in WiFi network when deploying a variety of safety measures, such as WiFi connection to Internet through after authentication, or require special client software, server-side in the background, carriers often provide 24-hour monitoring. Select the free WiFi beware "ghost" network information security expert Li Tiejun said users are using WiFiTo be itself alert, do not see free WiFi you would like to use, when you select the WiFi hotspots in public, be sure to see the hotspot name. Hackers are generally very similar, easily confused people WiFi name, such as Starbucks 2, KFC1, and so on, must be consulted before the Internet Manager. Mobile phones or laptop computersDo not start the automatic connection WiFi function, but via mobile phones or laptops with "query nearby available wireless network" function for the screening. Yu suggested that public best preference for operators to provide WiFi in public areas. "Many operators for their own users with free WiFi when you use long, make full use of this excellentWhitney can let users save money without having to secure better protection of WiFi services. �� Others:

No comments:

Post a Comment